Could a Keylogger Be Spying on You?

Techquickie ·Techquickie ·2019-05-06 · 841 words · ~4 min read
Floatplane YouTube

Transcript

JSON SRT VTT 109
0:00 Thanks for watching Techquickie.
0:01 Click the subscribe button,
0:02 then enable notifications with the bell icon
0:04 so you won't miss any future videos.
0:07 All right, so you're a privacy conscious individual.
0:10 You've got two factor on all your accounts.
0:12 You use a reputable VPN service,
0:14 and you even watched our earlier episode on
0:16 what your ISP knows about you.
0:20 But what if there was something lurking
0:22 on your computer itself that could spill
0:25 all of your secrets in spite of your precautions?
0:31 I'm talking, of course, about a keystroke logger
0:34 or keylogger, a nefarious type of program
0:37 that does exactly what it sounds like.
0:39 It logs every button you press on your keyboard.
0:44 And while sometimes these can be used
0:46 for legitimate purposes like parental monitoring
0:49 or language research, they also make it child's play
0:53 to steal passwords and search history
0:56 or even spy on emails to your significant other.
1:00 Yikes.
1:00 And because a keystroke logger
1:01 or keylogger's principle of operation is so simple,
1:04 they're easy to code, easy to deploy
1:07 in a wide variety of situations, and easy to hide.
1:11 Once you get infected,
1:13 often by clicking on a compromised link,
1:15 software keyloggers can live just about anywhere,
1:18 operating inside a script on the webpage itself,
1:21 injecting themselves into the memory space
1:23 used by your programs to make them hard to detect,
1:26 or even getting into the code
1:28 of your operating system itself as a root kit
1:31 or by posing as a keyboard driver.
1:34 By the way, root kits are nefarious little bastards.
1:37 You can learn more about those up here.
1:39 Making matters worse, unless you can see the keylogger
1:42 in the background or in your notification tray,
1:45 or you're like noticing obvious delays in the keystrokes
1:49 that aren't explained by anything else,
1:51 it is really difficult to know if you have one installed.
1:54 Defeating them can sometimes even require
1:56 specialized anti-malware software that is designed to protect
2:01 against logging software.
2:03 So you might want to consider that if you're really concerned
2:05 that someone might be spying on you.
2:07 And while you're at it,
2:09 you might want to check the back of your PC too.
2:12 Fortunately, these are usually pretty easy to spot,
2:15 but hardware keyloggers also exist,
2:18 often as a dongle that sits between your keyboard cable
2:22 and the USB port on your computer.
2:24 These can be especially troublesome in settings
2:27 where people might not be able to see the back of the PC,
2:31 like in a library or an office.
2:34 And depending on how valuable your work is,
2:37 even that might not be enough.
2:39 There have been cases of hardware keyloggers
2:42 being embedded inside a keyboard by a determined snoop,
2:47 and then either retrieved wirelessly using a transmitter
2:50 or physically by going back and digging it back out later.
2:54 It's also even possible for keyloggers to sniff
2:58 the sometimes unencrypted connection
3:01 between a wireless keyboard and the PC
3:04 to snatch keystrokes out of the air.
3:07 And we're not done yet.
3:09 Now this is some real James Bond level stuff right here.
3:12 It's also possible to record the sounds that you make
3:17 as you press each key,
3:18 and use the fact that each key will sound slightly different
3:22 based on its position to reconstruct what you typed.
3:27 Then if that's not crazy enough,
3:29 security researchers have found
3:31 that keyboards give off different frequencies
3:33 of radio waves when different keys are pressed,
3:36 and can even trigger smartphone accelerometers
3:40 strongly enough to discern different keystrokes
3:43 if it's sitting close enough to your keyboard.
3:48 So I think all of this is enough
3:49 to make pretty much anyone paranoid,
3:51 but I do have some good news.
3:53 Unless some spy agency is after you,
3:56 your best bet is to just take a quick glance
3:58 at your cable every now and then
4:00 if you're using a PC in a shared environment,
4:02 run good anti-malware software,
4:05 and as always, stay away from shady links.
4:12 PIA VPN supports multiple protocols and encryption levels,
4:16 which allows you to dial in the exact level of protection
4:19 that you need.
4:20 You can run it on up to five devices at once,
4:23 and they've got apps for Windows, Mac, Android, iOS, Linux,
4:27 and even a Chrome extension with support for more platforms,
4:31 and they're coming soon.
4:32 They've got lots of great features,
4:34 so in addition to being able to bypass geo-restrictions
4:37 and censorship by making you appear
4:38 as though you're connecting from somewhere else,
4:40 you can also block unwanted connections to prevent attacks,
4:43 auto-block all traffic if the VPN disconnects,
4:46 and it even includes MACE, PIA's built-in malware blocker.
4:50 So what are you waiting for?
4:51 Check out PIA at the link in the video description.
4:55 So thanks for watching, guys.
4:55 Like, dislike, check out our other channels,
4:57 leave a comment, and don't forget to subscribe
4:59 so you don't miss any of our videos.
5:01 Not one of them, you should watch every single one.